Institute of Advanced Engineering and Science (IAES)

Displaying 1-40 of 103 results

  • White Papers // Jun 2014

    Energy Consumption in Cloud Computing Data Centers

    The implementation of cloud computing has attracted computing as a utility and enables penetrative applications from scientific, consumer and business domains. However, this implementation faces tremendous energy consumption, carbon dioxide emission and associated costs concerns. With energy consumption becoming key issue for the operation and maintenance of cloud datacenters, cloud...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Apr 2014

    A Survey On Real World Botnets And Detection Mechanisms

    Mitigating the destructive effect of botnets is a concern of security scholars. Though various mechanisms are proposed for botnets detection, real world botnets still survive and do their harmful operations. Botnets have developed new evasion techniques and covert communication channels. Knowing the characteristics of real world botnets helps security researchers...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Apr 2014

    Comparison of Upgrading Infrastructure Optimal in Next Generation Wireless Network Using GA and ACO Techniques

    The authors introduce a new concept of Multiplicative Learning With Errors (MLWE), which is multiplicative version of the Learning With Errors (LWE). Then, they reduce that the hardness of the search version for MLWE to its decisional version under the condition of modulo of a product of sufficiently large smoothing...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Mar 2014

    Decision Based Median Filter algorithm using Resource Optimized FPGA to Extract Impulse Noise

    Median filter is a non-linear filter used in image processing for impulse noise removal. It finds its typical application in the situations where edges are to be preserved for higher level operations like segmentation, object recognition etc. This paper presents accurate and efficient noise detection and filtering algorithm for impulse...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Mar 2014

    FPGA Based Firewall using Embedded Processor for Vulnarability Packet Detection

    In this paper the authors describe the design of high performance packet filtering firewall using embedded system. An FPGA (Field Programmable Gate Array) platform has been used for implementation and analyzing the network firewall. It is capable of accepting real time changes. This network security application has an ability to...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Feb 2014

    Survey on Load Balancing Through Virtual Machine Scheduling in Cloud Computing Environment

    In the cloud environment number of user can request for the services simultaneously. So, there should be a mechanism that efficiently allocates the resources to the user, but resources in the cloud environment are highly dynamic and heterogeneous in nature. Because of this nature it is very difficult to fully...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Feb 2014

    Automatic Feature Extraction, Categorization and Detection of Malicious Code in Android Applications

    Since, Android has become a popular software platform for mobile devices recently; they offer almost the same functionality as personal computers. Malwares have also become a big concern. As the number of new Android applications tends to be rapidly increased in the near future, there is a need for automatic...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Feb 2014

    Antenna Design for UHF RFID Tags Using Two Coupled Patches

    In this paper, the authors present a patch antenna with compact low profile for Ultra-High Frequency (UHF) Radio Frequency IDentification (RFID), by using two coupled patches by passing C-shaped, wide impedance bandwidth at half power of 152MHz is obtained for UHF (860-960MHz) RFID. The lengths of the two patches are...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Feb 2014

    A Tool to Analyze Symmetric Key Algorithms

    With the growth of the internet and the interconnectivity of computer and data networks, security of data transmission has always been a concern of many stakeholders of information and communication arena. Among them, the researchers who work in the field of cryptography and network security pay a lot attention to...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Feb 2014

    An Elliptic Curve Based Multi-Signature Scheme for Wireless Network

    In this paper, the authors propose a design of multi-signature scheme for wireless networks and it is based on an improved elliptic curve digital signature algorithm. Wireless communications perform better with the elliptic curve cryptosystem because of their efficiency regarding speed, low bandwidth and high security. Multi-Signature is the special...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Feb 2014

    Enhancing Cloud Resource Utilisation Using Statistical Analysis

    Resource provisioning based on Virtual Machine (VM) has been widely accepted and adopted in cloud computing environments. A key problem resulting from using static scheduling approaches for allocating VMs on different Physical Machines (PMs) is that resources tend to be not fully utilized. Although, some existing cloud reconfiguration algorithms have...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2013

    A Multi-Core Heterogeneous Programmable Automation Controller System of Construction Machine

    As the new generation of the industrial controllers, the Programmable Automation Controller (PAC) is the core of the industrial automation platform. There are two main issues, high cost and interrupt response delay for current PACs (Programmable Automation Controllers) which are using high frequency single-chip microprocessors and commercial RTOS (Real-Time Operating...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2013

    FPGA Implementation of Park-Miller Algorithm to Generate Sequence of 32-Bit Pseudo Random Key for Encryption and Decryption of Plain Text

    There are many problems arises in randomized algorithms whose solutions are fundamentally based on assumptions that pure random numbers exist, so pseudo-random number generators can imitate randomness sufficiently well for most applications. The proposed scheme is a FPGA implementation of park-miller algorithm for generating sequence of pseudo-random keys. The properties...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2013

    Routing Optimization for Wireless Sensor Network Based on Cloud Adaptive Particle Swarm Optimization Algorithm

    One of the most important targets of routing algorithm for Wireless Sensor Network (WSN) is to prolong the network lifetime. Aimed at the features of WSN, a new routing optimization approach based on cloud adaptive particle swarm optimization algorithm is put forward in this paper. All paths appear at the...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2013

    A Multi-agent Supply Chain Information Coordination Mode based on Cloud Computing

    In order to improve the high efficiency and security of supply chain information coordination under cloud computing environment, this paper proposes a supply chain information coordination mode based on cloud computing. This mode has two basic statuses which are online status and offline status. At the online status, cloud computing...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2013

    Research and Simulation of Task Scheduling Algorithm in Cloud Computing

    In this paper, the authors focused on the task scheduling algorithms based on comprehensive QoS and constraint of expectation. Under the environment of dynamic cloud computing, efficiency improving of task scheduling and load balancing are eternal problems. For users, however, it's more important to meet their requirements of QoS. This...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2013

    A Resource Scheduling Strategy in Cloud Computing Based on Multi-Agent Genetic Algorithm

    Resource scheduling strategies in cloud computing are used either to improve system operating efficiency, or to improve user satisfaction. This paper presents an integrated scheduling strategy considering both resources credibility and user satisfaction. It takes user satisfaction as objective function and resources credibility as a part of the user satisfaction,...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2013

    A New Routing Protocol for Efficient and Secure Wireless Sensor Networks

    In this paper, the authors present an improved LEACH protocol to save energy and enhance network security for wireless sensor networks. All nodes are distributed evenly in sensing area. The sensing area is divided into a number of small squares called cells, and a cluster consists of four cells. The...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2013

    Secure Digital Certificate Design based on the Public Key Cryptography Algorithm

    With the popularity of the Internet, more and more people choose online shopping, however, in the case of lacking security measures, there is a great deal of risk on the Internet. to this situation. In response to this situation, this paper presents a digital certificate based on the X.509 standard....

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2013

    Risk Evaluation and Application on Fuzzy-FMECA Method Using Cloud Model

    In order to safeguard the safety of passengers and reduce maintenance costs, it is necessary to analyze and evaluate the security risk of the Railway Signal System. However, the conventional Fuzzy Analytical Hierarchy Process (FAHP) cannot describe the fuzziness and randomness of the judgment, accurately, and once the fuzzy sets...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2013

    An Improved Resource Query and Location Algorithm Based on Cloud Computing

    With the continuous development of cloud computing applications, the problems of cloud computing are more and more obvious, such as the lower efficiency of resource search, the lack of network scalability, and some difficulties in management. In this paper, the problems of P2P network and the structural characteristics of the...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2013

    Fuzzy Keyword Search with Safe Index over Encrypted Cloud Computing

    As cloud computing becomes more and more utilized, sensitive data are being stored in cloud central servers. To ensure privacy, these data are usually encrypted before uploading, which makes searching complicated. In this paper, the authors propose architecture of fuzzy keyword search with safe index. Bloom filter is used to...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2013

    A Safety Algorithm of P2P Routing Based on Multiple-Encryption Detecting Technology

    The nodes can freely join or leave the P2P network, which will lead to much false routing information that can cripple the performance of P2P network. Many hackers also utilize the weaken point to attack the P2P network. The authors propose a safety routing algorithm for P2P network to resist...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2013

    Analysis of HTTP Protocol Implementation in Smart Card Embedded Web Server

    The latest generation of smart card embeds an HTTP web server which facilitates the integration of smart card into the existing networks and provides more services and custom interfaces. It also helps the developers to simplify the use of new programming model (servlets). However, due to the sensitive information stored...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2013

    The Design and Verification of Disaster Recovery Strategies in Cloud Disaster Recovery Center

    Disaster recovery is an important means to ensure business continuity. However, the disaster recovery investment is so huge that the cloud disaster recovery becomes a best choice for enterprises, especially for SMEs. This paper discusses the necessity and importance of the cloud disaster recovery center and the vital indicators of...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2013

    A New P2P Identity Authentication Method Based on Zero-Knowledge Under Hybrid P2P Network

    On the basis of analyzing the shortcomings of traditional authentication mechanism synthetically, the paper presents a new kind of Peer-To-Peer (P2P) identity authentication model. In the new P2P Identity authentication model, it authenticates the identity of nodes by using a new Zero-Knowledge proof identification scheme which combines the advantage of...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2013

    A Method for Detecting and Blocking Instant Messaging Software

    Instant messaging software, as a convenient network communication tool, is becoming more and more popular. At the same time, it also brings risks in security of Local Area Network (LAN). Through studying in typical instant messaging software and detected by the combination of misuse detection and protocol analysis, an architecture...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2013

    Payload Attribution Using Winnowing Multi Hashing Method

    Payload attribution is a process to identify the sources and destinations of all packets that appeared on a network and a certain excerpt of a payload. This paper can be used for traffic efficiencies in investigating internet crime (cybercrime), such as tracing who is responsible for activities for unauthorized access,...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Sep 2013

    Analysis of the Relationship Between Hamming Distance and the Electromagnetic Information Leakage

    Electromagnetic information leak as a potential data security risk is more and more serious. Discussing the relationship between compromising emanations and Hamming distance is directed to preventing or reducing the electromagnetic information leakage. The paper presents the model of electromagnetic information leak, then the hierarchical protection strategy based on the...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Sep 2013

    The Designing of TEMPEST Security Testing Model

    TEMPEST testing is to acquire the electromagnetic emanations such as emission intensity, parasitic leakage, signal bandwidth, characteristics in time domain and frequency domain, etc, by special equipments then rating security level. Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Sep 2013

    A Chaos Cloud Particle Swarm Algorithm Based Available Transfer Capability

    A mathematical model for ATC based on optimal power flow was built under the static security constraints, where the maximum of all load nodes in receiving area was considered as aim function. In view of the defects of slow convergence and low accuracy in ATC optimization algorithms, a Chaos Cloud...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Sep 2013

    Software Resource Re-Sharing in Middle-Sized Enterprise Cloud Manufacturing System

    Some significant and related researches on software resource re-sharing in cloud manufacturing system at home and abroad is introduced, in addition, analyzing the structure of the software that applied to manufacturing currently are web-based, software are directly sharing, or package-based and remote sharing using the internet server provided the common...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Sep 2013

    Mobile Computing Clouds Interactive Model and Algorithm Based on Multi-Core Grids

    Multi-core technology is the key technology of mobile cloud computing, with the boom development of cloud technology, the authors focus on the problem of how to make the target code computed by mobile cloud terminal multi-core compiler to use cloud multi-core system construction, to ensure synchronization of data cross-validation compilation,...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Aug 2013

    Id-Based Aggregate Signature Scheme and Its Application in Authenticated Routing

    An aggregate signature scheme can aggregate n signatures on n distinct messages from n distinct signers into a single signature. Thus, n verification equations can be reduced to one. So the aggregate signature adapts to Mobile Ad-hoc NETwork (MANET). In this paper, the authors propose an efficient ID-based aggregate signature...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Aug 2013

    Clustering and Hybrid Genetic Algorithm Based Intrusion Detection Strategy

    Ad hoc networks face serious security threat due to its inherent weaknesses. Intrusion detection is crucial technology in protecting the security of Ad hoc networks. Recently, Intrusion Detection Systems (IDS) face open issues, such as how to make use of intrusion detection technologies to excavate normal/abnormal behaviors from a lot...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Aug 2013

    Detecting DDoS Attacks Against DNS Servers Using Time Series Analysis

    Domain Name System (DNS) Service is the basic support of Internet, which security plays a vital role in the entire Internet. Because DNS requests and responses are mostly UDP-based, and the existing large numbers of open recursive DNS servers, it is vulnerable to Distributed Denial of Services (DDoS) attacks. Through...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Aug 2013

    A Dynamic Non-interference Trust Chain Model Based on Security Process Algebra

    Since the concept of trusted computing is put forward by Trusted Computing Group (TCG), it has become one of the hotspots in information security study. Trust chain is the key technology of trusted computing. for lack of comprehensive theoretical model of trust chain, a dynamic trust chain model is proposed...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Aug 2013

    Dynamic Resource Provisioning in Cloud Based on Queuing Model

    One of the main aim of cloud computing is to provide bigger data center that will carter the storage needs of end user. In a data centre, server clusters are used to provide the required processing capability to get acceptable response time for interactive applications. Managing many applications on consolidated...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Aug 2013

    Cloud Computing Effectiveness Assessment

    The first problem tackled in this study is identification of variables that effect cloud computing effectiveness. Besides, proposing an appropriate method for assessing effectiveness in terms of the variables identified is the second problem of this paper. To solve these problems, the authors apply a four sequential step based approach...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Aug 2013

    Scalability Analysis of KVM-Based Private Cloud for IaaS

    One of the cloud technology cores is virtualization. Virtual Machine Manager (VMM) is said to have good scalability if it provides services to many virtual machines with a fair management of resources to maintain optimal performance of virtual machines'. Scalability evaluation of virtualization technology needs to be done so that...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Aug 2012

    Codes Correcting Blockwise S-Periodic Errors

    In most memory and storage system, the information is stored in various parts of the code length, known as sub-blocks. So, when error occurs in such a system, it does in a few places of the same sub-block and the pattern of errors is known. Thus, when the authors consider...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    Directional Antenna Assisted Scheme to Reduce Localization Error in Wireless Sensor Networks

    The existing omni directional antenna assisted schemes for localization of sensors in Wireless Sensor Networks (WSNs) are not very accurate due to various constraints, since issues like sensor distribution, topology control; high cost and localization error obstruct the effectiveness of these algorithms and schemes. This paper presents a modified High...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2012

    Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces

    Wireless grids are ad-hoc dynamic sharing of physical and virtual resources among heterogeneous devices. In order for wireless grids to be secure, the main communication device called a WiGLET must have precise control over the distribution of information exchanges amongst the devices with the ability to accommodate new devices and...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2012

    Evolutionary Computation Guided Energy Efficient Key Organization in Wireless Communication (ECEEKO)

    In this paper an Evolutionary Computation based Energy Efficient novel Key Organization (ECEEKO) policy has been proposed by incorporating computational safety, power management and restricted usage of memory in wireless communication. Generating functions of secured key are generated from the sink node through evolutionary computation and distribute to the header...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Aug 2012

    Identifying Phishing Threats in Government Web Services

    The governmental use of web technologies, including e-Government, has many advantages for citizens, but progress in this relationship has highlighted information security as an important issue in preserving a citizen's privacy. Unfortunately, unique governmental characteristics lead users to authenticate its service unwillingly; users may investigate service's possible and likely vulnerabilities...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2012

    Construction Efficiency of the Elliptic Curve Cryptosystem Using Code Computing for Amazigh Alphabet

    This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. A new secure scheme based on matrix scrambling using code computing on elliptic curve has been proposed here. The authors define two operations used to scramble code matrix...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2012

    An Optimal Sinsing Algorithm for Multiband Cognitive Radio Network

    In cognitive radio networks, the biggest problem preventing optimum performance is the optimal setting of individual decision thresholds while keeping the interference on the primary network bounded to a reasonably low level. In this paper, the multiband spectrum sensing problem is formulated as a class of optimization problem in which...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2012

    Modeling and Verification of Access Rights in Take-Grant Protection Model Using Colored Petri Nets

    Take-Grant Protection Model (TGPM) is a powerful method for modeling access rights in a wide range of systems. It is graph based formal method that can be used for studying situations that rights may unintentionally be transferred as rights leakage. Deduction of new rights using rules of this model is...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    An Architecture of Hybrid Intrusion Detection System

    Intrusion Detection System (IDS) is renowned and widely-deployed security tool to detect attacks and malicious activities in information system. It is an essential element of any contemporary information system. There are mainly two techniques for intrusion detection: misuse (signature-based) detection and anomaly (behavior-based) detection technique. Both the techniques have their...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Sep 2012

    Service-Oriented Management for Internet of Things

    Considering the popularity of Internet of Things, this paper discusses its management problem from the viewpoint of "Management as a Service", and proposes a service-oriented management solution for Internet of Things. This paper then focuses on issues related to the lightweight implementation of service-oriented management for Internet of Things and...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2012

    W2BC: A Proposal for a Converged Baseband Implementation of WiMax and WiFi Transceivers

    There have been many attempts to converge wireless teraservers functionality and implementation at various layers. This paper is to explore the similarities of the OFDM signals, as used in WiMax and WiFi, to converge their baseband implementation at the physical layer. The proposed W2BC solution reduces implementation complexity, size, power,...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation Multi-Hop Wireless Networks

    Multi-hop wireless networks are normally affected by TCP SYN flooding and IP address spoofing attacks. TCP SYN flooding occurs while establishing a TCP connection for data transmission. But, even after a TCP connection is established, TCP protocol is flooded by a novel connection flooding attack which aims at consuming the...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    Hierarchical Wireless Mesh Networks Scalable Secure Framework

    Wireless Mesh Networks (WMNs) are more scalable than any other wireless networks, because of its unique features such as interoperability, integration and heterogeneous device support. Lacks of robust existing services in WMNs all the features are more vulnerable to various types of attacks. Hence, protect the scalability of WMNs against...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    PCI Compliance - No Excuses, Please

    PCI Compliance is an area of particular concern for companies considering moving some of their activities onto the Cloud. This paper discusses how such concerns are really nothing new, that they are simply the latest manifestation of underlying friction that has long existed between merchants and payment card processors. The...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    PKC Scheme Based on DDLP

    This paper introduces the concept of public key cryptosystem, whose security is based on Double Discrete Logarithm Problem (DDLP) with distinct discrete exponents in the multiplicative group of finite fields. The adversary has to solve distinct discrete logarithm problems simultaneously in order to recover a corresponding plaintext from the received...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2012

    An Efficient RSA Cryptosystem with BM-PRIME Method

    The RSA cryptosystem due to Rivest, Shamir and Adleman is one of the most popular public key cryptosystem and widely used to ensure privacy and authenticity of electronic data. Using more than two factors in the modulus of the RSA cryptosystem has the arithmetic advantage that the private key computation...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2012

    Solving the File Allocation Problem in the Distributed Networks by Using Genetic Algorithms

    Average Distributed Program Throughput (ADPT) of the Distributed Computing System (DCS) depends mainly on the allocation of various resources. One of the important resources to be allocated on a DCS is various files. In this paper, the authors propose an approach that uses genetic algorithms to determine the optimal file...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    Reduction Techniques of Peak-to-Average Power Ratio in MCCDMA Systems

    The high Peak-to-Average Power Ratio (PAPR) is one of the main disadvantages of Multi-Carrier Code Division Multiple Access (MCCDMA) system. To reduce the PAPR of multi-carrier CDMA signals, a lot of studies have been focused on the power characteristics of spreading sequences. This paper presents the main techniques to reduce...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    Web-Based solution for Mapping Application using Open-Source Software Server

    Web GIS is an advance technology to manage and display all geographical locations on the earth surface. This paper deals with road analysis, to find the shortest path of route etc. so that these types of information can be displayed using Geographical Information System (GIS) technique. The approach combines both...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    Analysis Quality of Service from Internet Protocol Television (IP TV) Service

    IPTV was convergency product between broadcasting, telecommunication and information technology because it gave multimedia service such as TV broadcasting, video, audio, text, and data transmitted by using IP protocol. IPTV service had a better quality than conventional TV, such as Voice over Internet Protocol (VoIP), data (Internet), and Video on...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    Application of MIMO Technology to Systems Beyond 3G

    The evolution of mobile Broadband over the years has been phenomenal and worthy of attention by academics, researchers, the corporate world and users alike. From the days of the First Generation (1G) through the Third Generation (3G) communication systems, the evolution has continued and has been largely influenced by an...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Jul 2012

    Web-based Geographic Information System Design of Rabies Spread in Bali

    Rabies is still a serious threat in the province of Bali. As a densely populated area, Bali has a high population of dogs due to peculiarities of socio-cultural and bio-geography of Bali where there is a very close interaction between people and pets. The high population of dogs in Bali...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Jul 2012

    Uplink and Downlink of LTE-Release 10 in Cellular Communications

    In LTE-Advanced, Orthogonal Frequency Division Multiple Access (OFDMA) has been selected as the multiple access scheme for downlink and Single-Carrier Frequency Division Multiple Access (SC-FDMA) for uplink. OFDM is an attractive modulation technique in a cellular environment to combat frequency selective fading channels with a relatively low-complexity receiver. However, OFDM...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    A Review of Trust Aspects in Cloud Computing Security

    Cloud computing offers distributed and shared computing resources and services that belong to different service providers and websites. Before truly benefiting from cloud computing, there are several issues associated to it which need to be addressed in the first place. One of the most important aspects that needs special attention...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Dec 2012

    Cloud Computing : Research Issues and Implications

    Cloud computing is a rapidly developing and excellent promising technology. It has aroused the concern of the computer society of whole world. Cloud computing is Internet-based computing, whereby shared information, resources, and software, are provided to terminals and portable devices on-demand, like the energy grid. Cloud computing is the product...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2012

    Content-centric Information Protection in Cloud Computing

    Information security has become increasingly important as organizations migrate systems to third-party infrastructure providers. Once migrated, however, previously transparent network topologies, information paths, and systems infrastructure became more opaque. This loss of control when coupled with storage of corporate and personally sensitive information lead to significant increases in potential vulnerability....

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2012

    Cloud Computing with Related Enabling Technologies

    Cloud Computing is a concept that has been defined differently by many and there seem not to be a consensus. Despite these views, cloud computing is not a complete new idea as it has intricate connections to technologies or domain such as the Grid Computing paradigm, and the general distributed...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2012

    Evolution of Cloud Computing and Enabling Technologies

    The authors present an overview of the history of forecasting software over the past 25 years, concentrating especially on the interaction between computing and technologies from mainframe computing to cloud computing. The cloud computing is latest one. For delivering the vision of various of computing models, this paper lightly explains...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Oct 2012

    Enterprise Architecture Frameworks and Services for Cloud Computing

    Commercial Services for provisioning software components and virtual infrastructure in the cloud are emerging; this creates a multitude of possibilities for outsourcing part of the Service to third parties in order to run their applications. These possibilities are associated with different running services so cloud customers have to determine the...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Aug 2012

    Conceptualizing a Secure Wireless Cloud

    The interest in cloud computing by organizations has driven a core desire to become more effective and efficient with Information Technology (IT). Cloud computing enables organizations to utilize instantly provisioned scalable IT resources on a pay-per-use basis. The wireless grid provides a new model for heterogeneous devices to share physical...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Mar 2014

    Decision Based Median Filter algorithm using Resource Optimized FPGA to Extract Impulse Noise

    Median filter is a non-linear filter used in image processing for impulse noise removal. It finds its typical application in the situations where edges are to be preserved for higher level operations like segmentation, object recognition etc. This paper presents accurate and efficient noise detection and filtering algorithm for impulse...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Mar 2014

    FPGA Based Firewall using Embedded Processor for Vulnarability Packet Detection

    In this paper the authors describe the design of high performance packet filtering firewall using embedded system. An FPGA (Field Programmable Gate Array) platform has been used for implementation and analyzing the network firewall. It is capable of accepting real time changes. This network security application has an ability to...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Nov 2013

    FPGA Implementation of Park-Miller Algorithm to Generate Sequence of 32-Bit Pseudo Random Key for Encryption and Decryption of Plain Text

    There are many problems arises in randomized algorithms whose solutions are fundamentally based on assumptions that pure random numbers exist, so pseudo-random number generators can imitate randomness sufficiently well for most applications. The proposed scheme is a FPGA implementation of park-miller algorithm for generating sequence of pseudo-random keys. The properties...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Jun 2013

    Design of Mesh and Torus Topologies for Network-On-Chip Application

    The Network-on-Chip (NoC) is a communication centric interconnection approach which provides a scalable infrastructure to interconnect different IPs and sub-systems in a SoC. Network-on-Chip (NoC) is a general purpose on-chip communication concept that offers high throughput, which is the basic requirement to deal with complexity of modern systems. In network...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Mar 2013

    Design and Development of Stream Processor Architecture for GPU Application Using Reconfigurable Computing

    Graphical Processing Units (GPUs) have become an integral part of today's mainstream computing systems. They are also being used as reprogrammable General Purpose GPUs (GP-GPUs) to perform complex scientific computations. Reconfigurability is an attractive approach to embedded systems allowing hardware level modification. Hence, there is a high demand for GPU...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Apr 2014

    A Survey On Real World Botnets And Detection Mechanisms

    Mitigating the destructive effect of botnets is a concern of security scholars. Though various mechanisms are proposed for botnets detection, real world botnets still survive and do their harmful operations. Botnets have developed new evasion techniques and covert communication channels. Knowing the characteristics of real world botnets helps security researchers...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Apr 2014

    Comparison of Upgrading Infrastructure Optimal in Next Generation Wireless Network Using GA and ACO Techniques

    The authors introduce a new concept of Multiplicative Learning With Errors (MLWE), which is multiplicative version of the Learning With Errors (LWE). Then, they reduce that the hardness of the search version for MLWE to its decisional version under the condition of modulo of a product of sufficiently large smoothing...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Feb 2014

    Automatic Feature Extraction, Categorization and Detection of Malicious Code in Android Applications

    Since, Android has become a popular software platform for mobile devices recently; they offer almost the same functionality as personal computers. Malwares have also become a big concern. As the number of new Android applications tends to be rapidly increased in the near future, there is a need for automatic...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Feb 2014

    Antenna Design for UHF RFID Tags Using Two Coupled Patches

    In this paper, the authors present a patch antenna with compact low profile for Ultra-High Frequency (UHF) Radio Frequency IDentification (RFID), by using two coupled patches by passing C-shaped, wide impedance bandwidth at half power of 152MHz is obtained for UHF (860-960MHz) RFID. The lengths of the two patches are...

    Provided By Institute of Advanced Engineering and Science (IAES)

  • White Papers // Feb 2014

    A Tool to Analyze Symmetric Key Algorithms

    With the growth of the internet and the interconnectivity of computer and data networks, security of data transmission has always been a concern of many stakeholders of information and communication arena. Among them, the researchers who work in the field of cryptography and network security pay a lot attention to...

    Provided By Institute of Advanced Engineering and Science (IAES)